LI - API DATA BREACH Q324 Report
LI - API DATA BREACH Q324 Report
A reat
h
T 3 2024
Q
(415) 940-7077
www.wallarm.com 188 King St. Unit 508, San Francisco, CA 94107
Introduction 2
Introduction
I'm pleased to present the API ThreatStatsTM Q3 2024 Report, These incidents demonstrate that API security challenges are
which explores the most significant API security threats we've pervasive and can impact any industry, underlining the urgent
observed this quarter. The Wallarm team has diligently need for robust API security measures across all sectors.
analyzed the vulnerabilities that are reshaping our digital
landscape.
Our analysis uncovered 469 API vulnerabilities this quarter—a
21% increase from the previous one. The average CVSS score
This quarter, we've witnessed major data breaches across a is 7, with many scoring 7.5, indicating high severity and
wide range of industries, highlighting how API security reflecting how easily API issues can be exploited. The majority
connects us all. Unfortunately, API vulnerabilities are not of these vulnerabilities are straightforward for attackers to
confined to any single sector—they are widespread, affecting leverage, leading to effortless data theft. The impact of these
telecommunications, blockchain, media, and public breaches depends largely on the amount and sensitivity of
transportation alike. In July 2024, Deutsche Telekom in the the data exposed, rather than the specific types of
telecommunications industry suffered authentication flaws vulnerabilities. This trend highlights an escalating threat
that exposed personal information of 252 million users. On landscape where APIs are prime targets due to their
July 30, Hotjar and Business Insider, both in the SaaS and accessibility and the valuable data they handle.
media sectors, faced cross-site issues leading to potential
Ivan Novikov
account takeovers affecting 80 million readers. Explore
Talent, another SaaS company, experienced authorization
issues on August 15, exposing 11.4 million user records. In
September, Metro Pacific Tollways Corporation (MPTC) in
public transportation faced API leaks, exposing 972,848
records, including sensitive API adjustment logs. Additionally,
in July, Fractal ID, a blockchain platform, encountered Ivan Novikov
A key discovery this quarter is the integral role of API security in AI systems. There is no AI without APIs—
they are essential in connecting models, data, and infrastructure. Vulnerabilities in APIs directly impact AI
functionalities, and AI features can introduce unique vulnerabilities into APIs. Addressing AI exploits and API
vulnerabilities together is crucial for comprehensive security, as they are deeply interconnected.
3Q
Introduction 3
To help you navigate this report, we've included a 5x5 matrix outlining the top five topics, such as data breaches and
API exploits by product categories, paired with the top five risks. The cells contain specific data breaches,
vulnerabilities, and exploits, providing a clear overview of the current security landscape and allowing you to focus on
areas most relevant to your interests.
1 2 3 4 5
API Data
Breaches Deutsche Telekom Metro Pacific
Tollways
Explore Talent Hotjar and Business
Insider
Fractal ID
Corporation (MPTC)
AI API
Vulnerabilities OpenShift AI
(CVE-2024-7557)
NVIDIA CV-CUDA
(CVE-2024-0115)
MLFlow
(CVE-2023-1177)
Deep Lake
(CVE-2024-6507)
Langflow
(CVE-2024-7297)
l u ati e
C o d-N v a hi o p Vault -
H s c r Openshift-console - e netes - Bypass
Kub r Ansible Automation Envoy - Manipulation
API l its
Exp o
Denial of Service via
Exception Handling
Unauthenticated
Helm Chart
of Mountable
Secrets Policy (CVE
Controller -
Unauthorized k8s
of x-envoy Headers
(CVE-2024-45806)
(CVE Details Installation 2023-2728 and CVE API Server Access
Unspecified) (CVE-2024-7079) 2024-3177) (CVE-2024-6840)
Cisco Application Juniper Networks' Cilium - Security FortiEDR Manager Cisco NX-OS
Cybersecurity Policy Infrastructure Junos OS - Denial- Misconfiguration in API - Improper Software - Python
Products API Controller - of-Service Attack Gateway API Access Control Parser Escape
Vulnerabilities Unauthorized Policy
Actions
(CVE-2024-39530 (CVE-2024-42487) (CVE-2024-45323) Vulnerability
(CVE-2024-20286)
(CVE-2024-20279)
Metro Pacific Tollways Corporation (MPTC) API4: API Leaks 972,848 records
Transportation | September 2024
1
attackers to retrieve personal information, tariff details, and track users through permanent identifiers. The breach
affected 252 million users, highlighting how authentication flaws in client-side APIs can lead to massive data
leakage and persistent user tracking, posing risks far beyond simple data theft.
Lesson Learned: Prioritize comprehensive discovery of the API attack surface to identify publicly accessible APIs
lacking authentication. Undocumented or forgotten APIs can become significant vulnerabilities if they are exposed
without proper security measures. Implement automated tools and continuous monitoring to detect all external-
facing APIs, ensuring that authentication and authorization are enforced universally. Recognize that traditional
security solutions like WAFs and API gateways may not protect unknown or shadow APIs, making proactive
discovery essential.
On July 30, 2024, Hotjar and Business Insider faced combined OAuth mismanagement and Cross-Site Scripting
(XSS) vulnerabilities. These cross-site issues potentially allowed attackers to take over accounts of 80 million
2 readers. The vulnerabilities in their APIs could grant unauthorized access across their platforms, illustrating how
cross-site issues can amplify the damage compared to isolated security flaws.
Lesson Learned: Acknowledge that client-side attacks targeting APIs represent blind spots for many API security
solutions. Implement robust client-side security measures, including strict Content Security Policies (CSP) and
secure handling of OAuth tokens. Regularly assess client-side applications for vulnerabilities such as Cross-Site
Scripting (XSS) and ensure that client-side code does not expose sensitive API endpoints or tokens.
In July 2024, Fractal ID, a decentralized digital identity platform, experienced a breach affecting 6,300 users due to
authorization issues stemming from an insecure API script. Sensitive personal information, including digital wallet
3 addresses and identity documents, was exposed. The incident raises concerns about API security in decentralized
Lesson Learned: Recognize that mass assignment vulnerabilities cannot be fully mitigated by usual security
controls like negative security models or schema enforcement, especially when vulnerable fields are part of the
legitimate schema. Implement detailed validation and authorization checks for each field and action within the API.
Develop custom security measures within the application to prevent unauthorized access or modification of
sensitive data. Understand that protecting against mass assignment requires in-depth application logic that
exceeds the capabilities of standard WAFs and API gateways.
4 On August 1
5, 2024,
API. Unauthorized users could access personal information like emails, names, and phone numbers. This breach
uate authorization controls in APIs can enable attackers to harvest sensitive data at scale.
Lesson Learned: Address mass assignment vulnerabilities by enforcing strict server-side authorization checks
and avoiding automatic binding of client-supplied data to internal objects. Implement explicit allowlists for fields
that can be modified by users and validate permissions for each field during API operations. Recognize that
standard security controls focusing on negative models or schema enforcement may not prevent mass
assignment if the vulnerable fields are part of the schema. Custom application logic is necessary to ensure that
only authorized data modifications are allowed.
5 In September 2024, M PTC exposed 97 2,848 records, including sensitive API adjustment logs crucial for controlling
toll road systems. The API leaks not only facilitated data theft but also posed a risk of system manipulation,
potentially disrupting critical transportation infrastructure. This incident highlights the dangers of insecure APIs in
Lesson Learned: Implement advanced API rate limiting that goes beyond traditional IP or UR -based controls. L
Utilize API keys and analyze specific JSO N fields to count and limit re q uests on a per-user or per-API key basis.
This granular approach re q uires application-aware rate limiting that standard WAFs and API gateways may not
provide. By integrating rate limiting into the application logic, organizations can prevent abuse such as automated
Client-Side API Vulnerabilities API Misconfigurations Amplify APIs Are a Common Weak Link
Expose Hidden Risks: Not Breach Scale: Poorly secured Across Diverse Industries:
Covered by OWASP API Top-10: APIs, especially those with weak This summer’s breaches
Many breaches this quarter, like authentication and authorization affected a wide range of
those at Hotjar, Business Insider, controls, lead to large-scale sectors, from
and Explore Talent, originated breaches because attackers can telecommunications (Deutsche
from client-side API flaws, such access and download entire Telekom) and transportation
as OAuth misconfigurations and datasets, not just isolated (Metro Pacific Tollways
Cross-Site Scripting (XSS), portions. This was evident in Corporation) to blockchain and
which are not adequately incidents at Deutsche Telekom Web3 platforms (Fractal ID).
addressed by the OWASP API and Fractal ID, where These incidents prove that no
Top-10. Developers often unauthenticated API access industry is immune, and API
mistakenly consider OAuth a allowed attackers to exploit vulnerabilities are a universal
security improvement, but when massive amounts of personal challenge across both traditional
misconfigured, it becomes a data, tariff information, and user and cutting-edge tech
critical weakness, enabling tracking. Unlike traditional landscapes. Securing APIs
account takeovers and large- malware attacks that may target requires consistent, industry-
scale data exposure. These random subsets of data, API wide efforts to address evolving
incidents reveal that client-side breaches often result in attack vectors.
API security needs more complete data extraction,
attention and a dedicated making the impact far more
approach to prevent such severe.
breaches.
Q3 API Vulnerability Statistical Analysis 7
This represents a notable 21% quarter-over-quarter growth in the number of API vulnerabilities discovered.
The substantial rise highlights an escalating trend in security risks associated with APIs, which are becoming increasingly
prevalent as organizations continue to adopt cloud-native architectures and integrate open-source software into their
technology stacks.
The increase may be attributed to several factors, including the rapid expansion of API usage across various industries and the
growing complexity of modern application environments. As businesses accelerate their digital transformation efforts, APIs
serve as the backbone for enabling communication between services, which unfortunately also expands the potential attack
surface for malicious actors. Additionally, the widespread adoption of open-source components can introduce vulnerabilities if
not properly managed and secured.
The average CVSS score for Q3 API vulnerabilities is 7, high severity, and the CVSS score distribution skews towards high and
critical risk, rather than towards lower risks with a majority of issues (45%) at 7.5 score:
2.6
4.8
5.3
5.5
6.1
CVSS
7.1
7.4
7.8
8.8
s
9.1
vs
10
c
0 50 100 150 200 250
# of issues
Q3 API Vulnerability Statistical Analysis 8
A CVSS score of 7.5 often arises when the exploitability metrics are at their highest levels.
Despite the high exploitability, the impact
In the context of APIs, this means:
The vulnerability can be exploited remotely over a network connection. Since APIs are
inherently designed to be accessed over networks, they are particularly susceptible to Confidentiality Impact
network-based attacks. An attacker does not need physical access to the system; they can The vulnerability may lead to minor data
exploit the vulnerability from anywhere with internet connectivity.
exposure. Sensitive information could be
partially disclosed, but not to a full extent that
Attack Complexity (AC): Low (L)
would compromise the entire system's
Exploitation does not require any special conditions, configurations, or advanced technical confidentiality. For example, an attacker might
skills. This low complexity makes it easier for attackers, even those with limited expertise, to access non-critical data that should not be
exploit the vulnerability. It increases the pool of potential attackers and the likelihood of the public but isn't highly sensitive.
Integrity Impact
No action is required from legitimate users for the vulnerability to be exploited. The attack can
proceed without any user involvement, making it stealthy and harder to detect. Users are Availability Impact
Several types of vulnerabilities commonly receive a CVSS score of 7.5 in APIs, largely due to their high exploitability combined
with moderate impact. Understanding these vulnerabilities is crucial for organizations aiming to bolster their API security. These
vulnerabilities are often overlooked because they may not cause immediate critical damage, but their ease of exploitation
makes them attractive targets for attackers. Here, we delve into the most common types of these vulnerabilities, explaining how
they occur and the risks they pose.
s
Information Disclosure (API Leaks)
APIs might unintentionally expose sensitive data due to improper access controls or excessive data exposure. For instance, an API
s
endpoint could return more data than necessary, including internal identifiers or system information that could aid an attacker
v
Input Validation Flaws
c
Weak or insufficient validation allows attackers to manipulate API requests. This can lead to unintended behavior, such as
executing unauthorized operations or injecting malicious input that affects the application's logic
Untrolled Resource Consumption, Logic Bombs and Denial-of-Service (DoS)
APIs might be susceptible to resource exhaustion attacks that degrade performance. Attackers can overwhelm the API with
excessive requests, causing it to slow down or become temporarily unresponsive, affecting the user experience.
Q3 API Vulnerability Statistical Analysis 9
This quarter, we've continued to refine our API ThreatStatsTM classification approach by grouping related CWEs into our
proprietary Top-10 categories. This classification not only highlights the most prevalent issues but also aligns with the
industry's broader efforts to standardize API security assessments. By dissecting API exploits through the lens of CWE, we
can identify recurring patterns and root causes that allow for more targeted defenses.
Wallarm ThreatStatsTM methodology aligns with the comprehensive framework established in our 2023 report, ensuring
consistency and depth in our analysis. For a detailed overview of ThreatStatsTM API Top 10 methodology, refer to our 2024
annual report.
Despite its status as the 'holy grail' of vulnerability classification, CWE is not without its challenges. These include:
Overlaps: Some CWE Tree Dependencies: The Minor Issues: These may
1 entries may describe similar
weaknesses in slightly
2 hierarchical nature of CWE
can complicate the
3 include inconsistencies in how
different organizations
different contexts or layers, classification as lower-level interpret or apply CWE
leading to potential weaknesses are nested under classifications to specific
redundancy. more generalized categories. vulnerabilities.
While this data is invaluable, it is insufficient to construct an API-specific CWE Top-25 for just one quarter. The reason lies in
the distribution of these issues across many CWE classes, with several classes having only one or two reported issues. This
scarcity makes it challenging to rank these weaknesses accurately since, technically, many would need to share the same rank
due to their limited occurrences.
Therefore, while a quarterly API CWE Top-25 is not feasible, we plan to compile and analyze the data for the entire year. The
annual 2025 API ThreatStatsTM report will include a more robust and comprehensive CWE Top-25 tailored to API-specific
vulnerabilities.
The table on page 10 illustrates how the Q3-2024 API-specific CWEs align with the global Top-25 vulnerabilities identified in
2023. This mapping provides insights into the prevalence and impact of these weaknesses in the context of APIs.
CW E
Q3 API Vulnerability Statistical Analysis 10
40% of Q3 API CWE Top-10 are in Top-10 of CWE Top-25 2023 global. That shows relevance of the research and
wide/statistically significant presence of API issues in a subset of CVE 2023 issues, and/or their similarities to other
software bugs. The point is that APIs are just usual software with usual bugs.
Interestingly, we don't see CWE-400 Uncontrolled Resource Consumption in the CWE Top-25 list, although these bugs are
widely distributed. Their absence could be related to their relatively low risk compared to code execution vulnerabilities.
Conversely, it is interesting to see XSS/CWE-79 included in both the CWE Top-25 and the CWE API Top-10 Q3-24, despite
the web-based nature of these defects. Their inclusion is a good reminder of their role in the oAuth+XSS incidents at Hotjar
and Business Insider this quarter.
The complete CWE Top-10 for APIs is structured into three groups: AAA (Authentication, Authorization, Access Control),
Injections, and Logic Bombs. The AAA group prevails, comprising 163 issues compared to 145 for Injections, marking a 12%
predominance. Logic Bombs have emerged as a noteworthy discovery, aligning with trends highlighted in the OWASP API Top
10, which contrasts with the relative positioning of vulnerabilities like XSS in broader security analyses.
cwe #CWE CWE Top-25 Rank
1
2 CWE-284: Improper Access Control 45 13 Parent of #13 (CWE-287) and #22 (CWE-269)
7
8 CWE-287: Improper Authentication 24 13
9 CWE-918: Server-Side Request Forgery (SSRF) 20 19
10 CWE-20: Improper Input Validation 15 6
Q3 API Vulnerability Statistical Analysis 11
careful management.
The remaining 68% of vulnerabilities are mainly in enterprise software and APIs not specifically cloud-native. Notable examples
include Junos OS (Juniper Networks), NX-OS Software (Cisco), Application Policy Infrastructure Controller (Cisco), FortiEDR
Manager API (Fortinet), VMware vCenter Server, Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition,
SAP NetWeaver Application Server for ABAP and ABAP Platform, Now Platform (ServiceNow), Shopware, DocuSign API
package for Salesforce, IBM OpenPages, and AXIS OS (Axis Devices). These traditional enterprise applications remain
significant in the API landscape. Even though they are not cloud-native, these applications often expose APIs for integration
and functionality, making them susceptible to vulnerabilities if not properly secured. The presence of vulnerabilities in such
widely used enterprise software underscores the need for robust security measures across all types of platforms.
DevOps tool
36.2 %
Enterprise software
39.6 %
Enterprise hardware
1.7 %
API product categories are always interesting, with Enterprise Software, DevOps Tools, and Development
Frameworks leading the majority second year each quarter. This quarter we faced 3 times fewer AI API exploits
than last quarter, which may be a result of CVE applications and assignments seasonal effect in summer.
Since enterprise software category is No 1 we decided to include an in-depth analysis, this resulted in two outcomes, a Top-5
enterprise API exploits and Top-5 API Vulnerabilities in Cybersecurity Software.
Most Risky API Exploits by Product Categories 13
These top API exploits in AI products from Q3-24 demonstrate the growing importance of securing APIs within AI
ecosystems. Each exploit highlights a unique challenge in API security, from privilege management to resource handling
p 5 a i
Most Risky API Exploits by Product Categories 14
Lesson Learned: Never trust user inputs in API calls that invoke system commands. Always sanitize
and validate inputs, and use parameterized queries or safe execution functions to avoid command
injection vulnerabilities.
Lesson Learned: Implement strict privilege checks at every API endpoint, especially for sensitive
operations. Proper role-based access control (RBAC) and multi-factor authentication should be
enforced to prevent unauthorized privilege escalations.
op5pa5i
Most Risky API Exploits by Product Categories 15
in environments where SAP NetWeaver underpins a variety of essential business processes. A single
exploit could lead to substantial data breaches, operational disruptions, and financial losses.
Lesson Learned: The importance of implementing layered security measures such as meticulous
code review processes, enhanced API endpoint protection, and the integration of advanced
automated security scanning technologies cannot be overstated. These steps are critical in
identifying and mitigating such threats before they can be exploited.
data centers.
Lesson Learned: Regularly updating software and maintaining strict user access controls are
crucial. Additionally, deploying sophisticated monitoring tools and developing rapid incident response
protocols are vital to detect and respond to incidents promptly, preventing attackers from exploiting
such vulnerabilities.
not only compromises organizational security but also poses a risk to business integrity.
Lesson Learned: Strengthening access controls and implementing more robust authentication
mechanisms are essential to safeguard sensitive files. Regular audits and enhancements to API
security policies can further protect against such vulnerabilities, ensuring that confidential data
remains secure.
o p 5
r i s e
t rp
Most Risky API Exploits by Product Categories 16
Lesson Learned: Enterprises should prioritize frequent security updates and rigorously apply a
default-deny framework for all application interactions. Employing application behavior analysis
and stringent access controls can mitigate the risk of unauthorized access and ensure data integrity
across the board.
here carries not only data loss risks but also severe legal implications and trust erosion.
Lesson Learned: Regular security evaluations and robust integration practices are key to securing
APIs. Enterprises should also focus on the continuous monitoring and auditing of third-party
integrations to detect and rectify any security lapses promptly.
We hope that by absorbing these lessons and addressing the highlighted threats, businesses can enhance their API security
posture, secure the core systems that underpin their operations from the dynamic threats in today's API environment.
op 5ri
5
e
t ps
o rp
Most Risky API Exploits by Product Categories 17
p 5 c u r
o
t ers e
Most Risky API Exploits by Product Categories 18
Lesson Learned: Strengthening API security with robust access management systems is crucial.
Implementing layered security strategies, such as role-based access control (RBAC) and continuous
monitoring of API access patterns, can prevent unauthorized access and secure sensitive data
effectively.
Lesson Learned: Ensuring rigorous input validation and secure configuration of all software
components are vital. Organizations should employ sandboxing techniques judiciously,
complemented by strict security measures and regular security audits to detect and rectify such
vulnerabilities promptly.
t o p 5
o p5e cu
rs
Most Risky API Exploits by Product Categories 19
o
t dp 5
nat i
Most Risky API Exploits by Product Categories 20
Lesson Learned: It’s critical to monitor and control the execution paths that lead to critical API
endpoints, ensuring that all access is authenticated and authorized to prevent misuse.
Lesson Learned: Input validation and security hardening of headers are necessary to protect
against manipulations that could compromise the traffic management within microservices
architectures.
t opd np
o a5 5 t i
K I
ey nsights for Q3 2024 21
Cilium’s Gateway API, which could inadvertently extend These issues are part of a broader concern highlighted by
the accessibility of sensitive information beyond recent events involving CrowdStrike’s Falcon Sensor, which
intended limits. Patched versions v1.15.8 and v1.16.1 caused kernel panics and crashes on Linux systems due to
address this flaw, highlighting the importance of timely a kernel bug linked to BPF usage. The incident, which led to
changes allows Gateway resources to access secrets issues arising in the near future. The impact of such
across namespaces even after permissions are revoked, vulnerabilities is particularly severe due to the kernel-level
posing a serious risk of information exposure access eBPF provides. This makes every discovered
The focus of the current OWASP API Top-10 does not fully
capture the extent of client-side API vulnerabilities, especially
those exploiting the complex interactions between users,
OAuth, and other authentication mechanisms. This gap
OAuth, generally viewed as a security enhancer, can indicates a need for developers and security professionals to
transform into a major vulnerability when improperly expand their understanding and approach to API security,
configured. Such misconfigurations can lead to unauthorized ensuring comprehensive protection that includes both server-
access, extensive data exposures, and complete account side and client-side vulnerabilities.
I
Key Insights for Q3 2024 23
API Vulnerabilities in AI
Systems of Q3-24
1
Injection Vulnerabilities: AI systems are often susceptible to various forms of injection attacks due to their
reliance on extensive data input and outputs. For instance, vulnerabilities like SQL Injection can appear in AI
tools that interact with databases via APIs, as seen in tools like KubeClarity and Meshery. These flaws can lead
to unauthorized data manipulation and breaches, illustrating critical points where AI functionalities intersect
with traditional API vulnerabilities.
2
Authentication and Access Control Flaws: Authentication bypass is a common issue that affects both AI
and non-AI systems alike. In AI-centric products, such as OpenShift AI and Flowise, these vulnerabilities allow
attackers to escalate privileges or perform unauthorized actions across different parts of the AI ecosystem.
These incidents underscore the need for stringent authentication mechanisms in APIs that control access to AI
functionalities.
3
Configuration and Cryptographic Failures: Hard-coded cryptographic keys in systems like Dragonfly
demonstrate a significant risk in API security that directly affects the security of AI products. Such
misconfigurations can lead to authentication bypasses, giving attackers administrative access and potentially
compromising the entire AI system.
4
Client-Side API Vulnerabilities: While traditionally associated with web applications, client-side API
vulnerabilities also impact AI products that interact with client-side technologies. OAuth misconfigurations
and Cross-Site Scripting (XSS) vulnerabilities can lead to data breaches in AI systems that offer user-facing
functionalities, highlighting the overlapping concerns between API security and AI application security.
As Wallarm continues to track vulnerabilities, it's clear that AI and API security must be viewed as a unified challenge. Every AI
system relies on APIs to function, making them inseparable in both their operation and potential risks. The vulnerabilities we
observe in APIs directly affect the security and integrity of AI systems, and AI-specific functionalities can introduce unique risks
to the APIs they rely on. By addressing them together, enterprises ensure a more comprehensive approach to securing the
future of AI-driven technologies. AI exploits and API vulnerabilities are not separate issues—they are one and the same, and
need to be treated as such.
Action Items 25
Action Item: Design APIs with strong Action Item: Schedule regular security
authentication protocols, correctly assessments, including penetration testing and
Action Item: Deploy organization-wide API implementing standards like OAuth 2.0. Avoid code reviews, focusing on both server-side
discovery tools to identify all public-facing deploying APIs without authentication, even for and client-side APIs. Use specialized tools to
APIs, including undocumented or shadow APIs. internal services, to prevent unauthorized detect vulnerabilities like mass assignment,
Ensure that every API endpoint requires robust access similar to the Deutsche Telekom injection flaws, and authentication bypasses.
authentication mechanisms to prevent incident.
unauthorized access, mitigating risks like those Monitor and Secure Client-Side
seen in the Deutsche Telekom incident. Implement Detailed Input Applications
Address Client-Side API Validation and Output Encoding Case Reference: Hotjar and Business Insider's
Vulnerabilities Proactively Case Reference: Hotjar and Business Insider client-side vulnerabilities led to significant
suffered from XSS vulnerabilities leading to account takeovers.
Case Reference: Hotjar and Business Insider account takeovers.
faced account takeovers affecting 80 million Action Item: Extend your security measures to
readers due to OAuth misconfigurations and Action Item: Apply rigorous input validation client-side applications. Implement Content
Cross-Site Scripting (XSS) vulnerabilities and output encoding on all API endpoints to Security Policies (CSP) and ensure secure
(CVE-2024-XXXX).
prevent injection attacks, including XSS. handling of tokens and sensitive data on the
Ensure that both server-side and client-side client side to prevent attacks that bypass
Action Item: Expand your security strategy to validations are in place to protect against server-side defenses.
include client-side API vulnerabilities. Invest in malicious inputs.
training for your teams on securing OAuth
implementations and preventing XSS attacks.
Implement policies that require regular
assessments of client-side applications to
uncover vulnerabilities that traditional server-
side security measures might miss.
Action Items 26
Enhance Authorization Checks to Prevent Mass Assignment Enhance Logging and Anomaly
Prevent Mass Assignment Vulnerabilities Detection or APIs f
Case References: Explore Talent exposed 11.4 Case References: Explore Talent's exposure Case Reference: MPTC's lack of monitoring
million user records due to authorization issues of user records due to authorization flaws.
allowed for unnoticed data exfiltration.
authorization checks for all APIs. Ensure define which fields are allowed to be modified times, b ena p p
ling swift res onse to otential
vulnerabilities by explicitly defining permissible checks for each field and operation within your
fields for user modification and validating user APIs. Apply Application-Aware Rate
permissions for each API operation. Limiting and Access Controls
Design Application-Level Rate
Implement Advanced, Application- Limiting Mechanisms Case Reference: Exploitation of APIs without
Aware Rate Limiting effective rate limiting, as seen in several
Case Reference: MPTC's API leaks due to breaches this quarter.
Case Reference: Metro Pacific Tollways inadequate rate limiting controls. Action Item: Collaborate with API architects to
Corporation (MPTC) exposed 972,848 records Action Item: Incorporate rate limiting within implement rate limiting based on API keys and
due to API leaks in September 2024. the application logic of your APIs. Use API keys user behavior. Ensure that access controls are
Action Item: Develop rate limiting strategies and user identifiers to monitor and control the fine-tuned to prevent excessive requests and
that go beyond traditional IP-based controls. rate of requests, focusing on user behavior and potential abuse.
Utilize API keys and monitor specific user specific API actions rather than just IP
behaviors and data patterns within JSON addresses. Stay Informed on Emerging
payloads to apply granular rate limiting. This Threats and CVEs
approach helps prevent automated attacks Integrate Security into AI API Case References: OpenShift AI's vulnerability
and abuse that exploit API endpoints, as seen Development (CVE-2024-7557).
By focusing on these actionable steps, each role can address the specific challenges highlighted by the real cases and CVEs in
this report. The pervasive API vulnerabilities we've identified this quarter demonstrate the critical need for coordinated efforts
across all levels of your organization. Together, we can enhance our collective security posture and better protect our
interconnected digital landscape.
As we continue to monitor and analyze API security threats, we invite you to follow us on LinkedIn to stay informed about our
latest insights and updates. Don't miss our upcoming Annual 2024 API ThreatStatsTM Report, where we'll delve deeper into the
trends and findings shaping the future of API security.